FortiClient - Lack of client-side certificate validation in ZTNA service

Summary

An improper certificate validation vulnerability [CWE-295] in FortiClientWindows, FortiClientLinux and FortiClientMac may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiGate and the FortiClient during the ZTNA tunnel creation

Version Affected Solution
FortiClientLinux 7.2 7.2.0 Upgrade to 7.2.1 or above
FortiClientLinux 7.0 7.0.0 through 7.0.11 Upgrade to 7.0.12 or above
FortiClientMac 7.2 7.2.0 through 7.2.4 Upgrade to 7.2.5 or above
FortiClientMac 7.0 7.0.0 through 7.0.11 Upgrade to 7.0.12 or above
FortiClientWindows 7.2 7.2.0 through 7.2.2 Upgrade to 7.2.3 or above
FortiClientWindows 7.0 7.0.0 through 7.0.11 Upgrade to 7.0.12 or above

Acknowledgement

Fortinet is pleased to thank Christian Hilgers from indevis IT-Consulting and Solutions GmbH for reporting this vulnerability under responsible disclosure

Timeline

2024-09-10: Initial publication